General Information

Execution After Redirect

Variants:
Direct 

Also Known As:
EAR

Vector Type:
Attack

Relevance:
Generic

Layer:
Application-Level

Platforms:
Any

Target Type:
Web Application

Affected Mechanisms:
Authentication Enforcement, Privilege Validation

Invented In:
01/12/2010

Added In:
05/12/2014


Vector Operation Method:
Attackers can execute seemingly protected modules in the applications while ignoring redirects designed to protect the modules from unauthorized access, by acessing or re-accessing these modules with input parameters relevant for the code execution, and hoping the operations will be executed DESPITE the redirects, due to a lack of actual code termination. These attacks can enable attackers to gain access and even affect authenticated, privileged or otherwise sensitive content.


Direct Variant:

Execution After Redirect

Variant Title:
Execution After Redirect

Typical Severity:
Major

Resources:

White Papers:

Learn More: